{"id":51280,"date":"2023-03-31T21:32:00","date_gmt":"2023-03-31T21:32:00","guid":{"rendered":"https:\/\/www.darkreading.com\/cloud\/the-fda-medical-device-cybersecurity-overhaul-real-teeth"},"modified":"2023-03-31T21:32:00","modified_gmt":"2023-03-31T21:32:00","slug":"the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/","title":{"rendered":"The FDA&#8217;s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd121bacf308c3891\/628d0b5e5d99427d9815a29c\/Medical-device_gajendra_bhati_Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The Food and Drug Administration (FDA) this week put into effect fresh guidance concerning the cybersecurity of medical devices \u2014 long a concerning area of risk for healthcare organizations and patients alike. The policy is one in a long line of attempts by the FDA to put some guardrails around the susceptibility of things like insulin pumps and heart monitors to hacking, and experts say that this time, the FDA&#8217;s move might actually make a difference.<\/p>\n<p>Effective immediately, medical device manufacturers are advised to submit &#8220;a plan to monitor, identify, and address, as appropriate, in a reasonable time, postmarket cybersecurity vulnerabilities, and exploits.&#8221;<\/p>\n<p>Manufacturers are also asked to &#8220;design, develop, and maintain processes and procedures to provide a reasonable assurance that the device and related systems are cybersecure.&#8221; This includes making patches available &#8220;on a reasonably justified regular cycle,&#8221; and for newfound critical vulnerabilities, &#8220;as soon as possible out of cycle.&#8221;<\/p>\n<p>And finally, the <a href=\"https:\/\/www.fda.gov\/media\/166614\/download\" target=\"_blank\" rel=\"noopener\">FDA is asking<\/a> that new devices come prepared with a <a href=\"https:\/\/www.darkreading.com\/risk\/this-will-be-the-year-of-the-sbom-for-better-or-for-worse\" target=\"_blank\" rel=\"noopener\">software bill of materials (SBOM)<\/a>.<\/p>\n<p>For some, FDA guidance may evoke memories of <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/fda-issues-guidelines-for-security-of-medical-devices-in-use\" target=\"_blank\" rel=\"noopener\">prior actions<\/a> that <a href=\"https:\/\/www.darkreading.com\/iot\/medical-device-security-gets-intensive-care\" target=\"_blank\" rel=\"noopener\">failed to improve cybersecurity<\/a> in this critical area in any real way. But experts say this long road has finally reached a real, genuine inflection point. Starting now, new medical devices that don&#8217;t meet these standards will be blocked from the market.<\/p>\n<p>&#8220;It&#8217;s actually been a process that&#8217;s taken place over approximately the last 10 years,&#8221; says Cybellum CMO David Leichner. &#8220;And it came to fruition two days ago.&#8221;<\/p>\n<h2 class=\"regular-text\">Medical Devices in Cyber-Crisis<\/h2>\n<p><a href=\"https:\/\/www.darkreading.com\/iot\/black-hat-flashback-deadly-consequences-weak-medical-device-security\" target=\"_blank\" rel=\"noopener\">Medical device security<\/a> has been an alarmingly lagging area for cybersecurity for a very long time, and there&#8217;s a laundry list of reasons why. Healthcare facilities often use legacy IT and have flat networks that aren&#8217;t segmented, for instance \u2014 even as medical devices for patients are increasingly connected. And <a href=\"https:\/\/www.darkreading.com\/edge-articles\/embracing-security-by-design-part-1-security-isn-t-a-pretty-picture\" target=\"_blank\" rel=\"noopener\">security by design<\/a> isn&#8217;t common.<\/p>\n<p>&#8220;A medical device manufacturer may be very experienced in designing highly reliable and innovative devices, but they may not necessarily be security experts,&#8221; explains Axel Wirth, chief security strategist at MedCrypt.<\/p>\n<p>In fact, the most cutting-edge medical equipment sometimes introduces new security problems that the old stuff never had. Internet connectivity brings a slew of benefits to providers, but also <a href=\"https:\/\/www.darkreading.com\/risk\/fda-issues-guidelines-on-wireless-medical-devices\" target=\"_blank\" rel=\"noopener\">opportunities for hackers<\/a>. In the <a href=\"https:\/\/www.cynerio.com\/landing-pages\/the-state-of-healthcare-iot-device-security-2022\" target=\"_blank\" rel=\"noopener\">State of Healthcare IoT Device Security 2022 report<\/a>, healthcare IoT firm Cynerio found that more than half of all connected medical devices are vulnerable, including, for example, nearly three out of every four IV pumps.<\/p>\n<p>Thus, cybercriminals can easily break in and run rampant across a hospital network, reaching whatever endpoints they choose, including these life-saving devices. This could have potential physical consequences for patients if a device is vulnerable to takeover by an unauthorized user. The risk isn&#8217;t theoretical: A <a href=\"https:\/\/www.proofpoint.com\/sites\/default\/files\/threat-reports\/pfpt-us-tr-cyber-insecurity-healthcare-ponemon-report.pdf\" target=\"_blank\" rel=\"noopener\">September 2022 report by Proofpoint&#8217;s Ponemon Institute<\/a> linked a 20% increase in mortality rates to cyberattacks targeting healthcare organizations.<\/p>\n<p>This is all exacerbated by the fact that when bugs are discovered, device manufacturers have a terrible track record of issuing patches in a timely manner (as is the case for most IoT gear), and healthcare settings have an even more terrible track record of implementing them.<\/p>\n<p>&#8220;One reason [for the insecurity] is that these devices live longer,&#8221; Wirth points out. Because they&#8217;re designed to last a while \u2014 which is otherwise a positive thing \u2014 &#8220;they may be outdated or running outdated software, and any <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/medical-and-iot-devices-from-more-than-100-vendors-vulnerable-to-attack\" target=\"_blank\" rel=\"noopener\">operational technology (OT)<\/a> that is not necessarily up to date is more difficult to maintain. It&#8217;s more difficult to deploy patches; it&#8217;s more difficult to find time during hospital operations to update the device.&#8221;<\/p>\n<p>Considering the ubiquity of <a href=\"https:\/\/www.darkreading.com\/tech-trends\/many-medical-device-makers-skimp-on-security-practices\" target=\"_blank\" rel=\"noopener\">security failures in the industry<\/a>, coupled with the massive consequences at stake in the event of a breach, many have urged the government to do more than offer &#8220;suggestions&#8221; for addressing the problems.<\/p>\n<h2 class=\"regular-text\">The FDA&#8217;s New Teeth<\/h2>\n<p>On Dec. 29, President Biden signed into law the <a href=\"https:\/\/www.govinfo.gov\/content\/pkg\/BILLS-117hr2617enr\/uslm\/BILLS-117hr2617enr.xml\" target=\"_blank\" rel=\"noopener\">Consolidated Appropriations Act<\/a>, also known as the Omnibus bill, which included Section 3305 \u2014 &#8220;Ensuring cybersecurity of medical devices&#8221; \u2014 an amendment to the <a href=\"https:\/\/www.govinfo.gov\/content\/pkg\/COMPS-973\/uslm\/COMPS-973.xml\" target=\"_blank\" rel=\"noopener\">Federal Food, Drug, and Cosmetic Act<\/a>. It took effect on Thursday, 90 days after the Omnibus&#8217; passing.<\/p>\n<p>So what happens now? It takes time for manufacturers to change their processes and for new products to integrate new rules and regulations (to say nothing of how healthcare, in general, moves more slowly than other industries, by necessity). The FDA has arranged for a six-month window \u2014 until Oct. 1 \u2014 for manufacturers to get used to the new rules of the road.<\/p>\n<p>From now until then, the FDA will &#8220;work collaboratively&#8221; with manufacturers to ensure compliance, the agency clarified in an <a href=\"https:\/\/www.fda.gov\/regulatory-information\/search-fda-guidance-documents\/cybersecurity-medical-devices-refuse-accept-policy-cyber-devices-and-related-systems-under-section#:~:text=On%20December%2029%2C%202022%2C%20the,524B%2C%20Ensuring%20Cybersecurity%20of%20Devices.\" target=\"_blank\" rel=\"noopener\">accompanying notice<\/a>. Once Oct. 1 hits, &#8220;FDA expects that sponsors of such cyber devices will have had sufficient time to prepare.&#8221; At that point, they will begin issuing &#8220;refuse to accept&#8221; (RTA) decisions to prevent any devices that don&#8217;t meet the stated standards from reaching the market.<\/p>\n<p>&#8220;Manufacturers are asking: &#8216;When does this hit us?,'&#8221; Naomi Schwartz, MedCrypt&#8217;s senior director of cybersecurity quality and safety, explains. &#8220;And the FDA is clarifying: &#8216;We&#8217;re not going to start refusing to accept until October, so that you have time to update all of your documentation and relieve a little bit of pressure and fear. But no kidding, you guys better get your stuff ready in the next six months, because it&#8217;s coming.'&#8221;<\/p>\n<p>What remains to be seen is how the FDA will enforce its rules after a device is released to the public. Preventing a machine from reaching hospitals is one thing, but ensuring that vendors meet so many of the other requirements outlined in these guidelines \u2014 like regular monitoring, consistent patching, and responsible vulnerability disclosure \u2014 requires never-ending oversight.<\/p>\n<p>&#8220;This is definitely going to increase the overhead of the FDA,&#8221; Cybellum&#8217;s Leichner figures. &#8220;It&#8217;ll be interesting to see how they go about this.&#8221;<\/p>\n<h2 class=\"regular-text\">The Timeline for Real, Visible Change<\/h2>\n<p>Even once manufacturers start turning out gear that&#8217;s in compliance with the policy, an overhaul of healthcare device cybersecurity will take a while.<\/p>\n<p>&#8220;Medical devices can be very pricey,&#8221; Wirth points out, &#8220;and replacing medical devices in hospitals requires budget, requires training. Sometimes it requires even changes in building and infrastructure. So it&#8217;ll take a number of years.&#8221; Section 3305 assigns no deadline for healthcare providers to replace their existing legacy equipment.<\/p>\n<p>Still, he says, &#8220;I think we are already seeing better secure devices arrive in the market,&#8221; especially since the US isn&#8217;t the only place to <a href=\"https:\/\/www.darkreading.com\/edge-articles\/how-europe-is-using-regulations-to-harden-medical-devices-against-attack\" target=\"_blank\" rel=\"noopener\">start demanding security hardening<\/a> of the devices.<\/p>\n<p>Even though the FDA&#8217;s policy might take a while to bear real fruit (and it&#8217;s too soon to know for certain), we may look back on 2023 as a watershed for the industry.<\/p>\n<p>&#8220;This is going to help FDA staff, it&#8217;s going to help the industry, it&#8217;s going to motivate people to stop kicking the can down the road and start buckling down now,&#8221; MedCrypt\u2019s Schwartz concludes. &#8220;It&#8217;s pretty cool.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/the-fda-medical-device-cybersecurity-overhaul-real-teeth\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The physical and cyber safety issues surrounding medical devices like IV pumps is finally being meaningfully addressed by a new policy taking effect this week.Read More <a href=\"https:\/\/www.darkreading.com\/cloud\/the-fda-medical-device-cybersecurity-overhaul-real-teeth\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-51280","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The FDA&#039;s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The FDA&#039;s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-31T21:32:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd121bacf308c3891\/628d0b5e5d99427d9815a29c\/Medical-device_gajendra_bhati_Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The FDA&#8217;s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say\",\"datePublished\":\"2023-03-31T21:32:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\\\/\"},\"wordCount\":1171,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltd121bacf308c3891\\\/628d0b5e5d99427d9815a29c\\\/Medical-device_gajendra_bhati_Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\\\/\",\"name\":\"The FDA's Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltd121bacf308c3891\\\/628d0b5e5d99427d9815a29c\\\/Medical-device_gajendra_bhati_Alamy.jpg\",\"datePublished\":\"2023-03-31T21:32:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltd121bacf308c3891\\\/628d0b5e5d99427d9815a29c\\\/Medical-device_gajendra_bhati_Alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltd121bacf308c3891\\\/628d0b5e5d99427d9815a29c\\\/Medical-device_gajendra_bhati_Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The FDA&#8217;s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The FDA's Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/","og_locale":"en_US","og_type":"article","og_title":"The FDA's Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-31T21:32:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd121bacf308c3891\/628d0b5e5d99427d9815a29c\/Medical-device_gajendra_bhati_Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The FDA&#8217;s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say","datePublished":"2023-03-31T21:32:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/"},"wordCount":1171,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd121bacf308c3891\/628d0b5e5d99427d9815a29c\/Medical-device_gajendra_bhati_Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/","url":"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/","name":"The FDA's Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd121bacf308c3891\/628d0b5e5d99427d9815a29c\/Medical-device_gajendra_bhati_Alamy.jpg","datePublished":"2023-03-31T21:32:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd121bacf308c3891\/628d0b5e5d99427d9815a29c\/Medical-device_gajendra_bhati_Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd121bacf308c3891\/628d0b5e5d99427d9815a29c\/Medical-device_gajendra_bhati_Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-fdas-medical-device-cybersecurity-overhaul-has-real-teeth-experts-say\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"The FDA&#8217;s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51280"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51280\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}